Professional Documents
Culture Documents
A Rosetta Stone For Quantum Mech. W. An Intro To Quantum Computation (JNL Article) - S. Lomonaco (2000) WW PDF
A Rosetta Stone For Quantum Mech. W. An Intro To Quantum Computation (JNL Article) - S. Lomonaco (2000) WW PDF
Contents
Part 1.
Preamble
1. Introduction
5
5
5
6
6
7
7
Part 2.
8
8
8
10
12
13
15
16
17
18
19
19
20
20
21
22
23
24
26
27
27
28
7. Quantum entanglement
31
7.1. The juxtaposition of two quantum systems
31
7.2. An example: An n-qubit register Q consisting of the juxtaposition
of n qubits.
32
7.3. An example of the dynamic behavior of a 2-qubit register
33
7.4. Definition of quantum entanglement
35
7.5. Einstein, Podolsky, Rosens (EPRs) grand challenge to quantum
mechanics.
36
7.6. Why did Einstein, Podolsky, Rosen (EPR) object?
37
7.7. Quantum entanglement: The Lie group perspective
39
8. Entropy and quantum mechanics
8.1. Classical entropy, i.e., Shannon Entropy
8.2. Quantum entropy, i.e., Von Neumann entropy
8.3. How is quantum entropy related to classical entropy?
8.4. When a part is greater than the whole Ignorance = uncertainty
43
43
44
46
46
48
Part 3.
48
51
51
53
54
54
55
57
60
61
62
62
64
65
48
49
49
13.6.
13.7.
13.8.
13.9.
13.10.
67
69
70
75
76
80
80
81
82
83
87
88
90
References
Index
90
95
Part 1.
Preamble
1. Introduction
These lecture notes were written for the American Mathematical Society
(AMS) Short Course on Quantum Computation held 17-18 January 2000
in conjunction with the Annual Meeting of the AMS in Washington, DC in
January 2000. The notes are intended for readers with some mathematical
background but with little or no exposure to quantum mechanics. The
purpose of these notes is to provide such readers with enough material in
quantum mechanics and quantum computation to begin reading the vast
literature on quantum computation, quantum cryptography, and quantum
information theory.
The paper was written in an informal style. Whenever possible, each
new topic was begun with the introduction of the underlying motivating
intuitions, and then followed by an explanation of the accompanying mathematical finery. Hopefully, once having grasped the basic intuitions, the
reader will find that the remaining material easily follows.
Since this paper is intended for a diverse audience, it was written at
varying levels of difficulty and sophistication, from the very elementary to
the more advanced. A large number of examples have been included. An
index and table of contents are provided for those readers who prefer to
pick and choose. Hopefully, this paper will provide something of interest
for everyone.
Because of space limitations, these notes are, of necessity, far from a
complete overview of quantum mechanics. For example, only finite dimensional Hilbert spaces are considered, thereby avoiding the many pathologies
that always arise when dealing with infinite dimensional objects. Many
important experiments that are traditionally part of the standard fare in
quantum mechanics texts (such as for example, the Stern-Gerlach experiment, Youngs two slit experiment, the Aspect experiment) have not been
mentioned in this paper. We leave it to the reader to decide if these notes
have achieved their objective.
The final version of this paper together with all the other lecture notes
of the AMS Short Course on Quantum Computation will be published as a
book in the AMS PSAPM Series entitled Quantum Computation.
This is a result of the no-cloning theorem of Wootters and Zurek[83]. A proof of the
no-cloning theorem is given in Section 10.8 of this paper.
light. For that reason, they are often used to eliminate road glare, i.e.,
horizontally polarized light reflected from the road.
3.2. Where do qubits live? But what is a qubit?
But where do qubits live? They live in a Hilbert space H. By a Hilbert
space, we mean:
A Hilbert space H is a vector space over the complex numbers C with
a complex valued inner product
(, ) : H H C
which is complete with respect to the norm
p
kuk = (u, u)
2
Barenco et al in [1] define a qubit as a quantum system with a two dimensional Hilbert
space, capable of existing in a superposition of Boolean states, and also capable of being
entangled with the states of other qubits. Their more functional definition will take on
more meaning as the reader progresses through this paper.
Part 2.
| label i
Let H denote the Hilbert space of all Hilbert space morphisms of H into
the Hilbert space of all complex numbers C, i.e.,
H = HomC (H, C) .
The elements of H will be called bra vectors, state bras, or simply bras.
They will be denoted as:
h label |
h label1 | (| label2 i)
h label1 | label2 i
and will be called the bra-(c)-ket product of the bra h label1 | and the ket
| label2 i.
defined by
H H
| label i 7 ( | label i , )
Hence,
h label1 | label2 i = (| label1 i , | label2 i)
Remark 3. Please note that ( | label i) = hlabel|.
The tensor product3 H K of two Hilbert spaces H and K is simply
the simplest Hilbert space such that
1) (h1 + h2 ) k = h1 k + h2 k, for all h1 , h2 H and for all k K,
and
2) h (k1 + k2) = h k1 + h k2 for all h H and for all k1 , k2 K.
3) (h k) (h) k = h (k) for all C, h H, k K.
Remark 4. Hence, k |labeli k =
(| label1 i , | label2 i) .
p
h label | label i and h label1 | label2 i =
10
|%i =
|%i = 2 (|li + |i)
|&i =
|li =
|i =
|i =
| i =
1
2
1
2
(|li |i)
1
2
(|%i |&i)
|&i =
|li =
(|%i + |&i)
1
2
(|li i |i)
1
2
(|li + i |i)
1+i
2
|i +
1i
2
| i
1i
2
|i +
1+i
2
| i
|i =
|i =
11
| i =
1
2
(|i + | i)
(|i | i)
1i
2
|%i +
1+i
2
|&i
1+i
2
|%i +
1i
2
|&i
The bracket products of the various polarization kets are given in the
table below:
|li |i |%i |&i
|i | i
1
1
1
1
hl|
1
0
2
2
2
2
1
1
i
i
h| 0
1
2
2
2
2
h%|
h&|
h|
h |
1
2
1
2
1
2
1
2
1
2
12
i
2
i2
1
0
0
1
1i
2
1+i
2
1+i
2
1i
2
1+i
2
1i
2
1i
2
1+i
2
1
0
0
1
In terms of the basis {|li , |i} and the dual basis {hl| , h|}, these kets
and bras can be written as matrices as indicated below:
1
1 0 ,
hl| =
|li =
h| =
h%| =
h&| =
h| =
h | =
0 1
1
2
|i =
1 1
1
2
1 1
1
2
1 i
1
2
1 i
|%i =
|&i =
|i =
| i =
1
2
0
1
1
1
1
1
1
1
2
i
1
2
1
2
1
i
12
|%i =
1
2
1
2
1
2
i2
1
1 i
=
2 1
i
i
1
i
2
2
2
4.3. A Rosetta stone for Dirac notation: Part II. Operators.
An (linear) operator or transformation O on a ket space H is a
Hilbert space morphism of H into H, i.e., is an element of
HomC (H, H)
The adjoint O of an operator O is that operator such that
O | label1 i , | label2 i = (| label1 i , O | label2 i)
13
A |labeli = a |labeli .
A |ai i = ai |ai i
for the eigenvalue ai , which is the outer product of ket |ai i with its adjoint
the bra hai |, where we have assumed that |ai i (and hence, hai |) is of unit
length. It has two eigenvalues 0 and 1. 1 is a nondegenerate eigenvalue with
eigenket |ai i. 0 is a degenerate eigenvalue with corresponding eigenkets
{ |aj i }j6=i .
An observable A is said to be complete if its eigenkets |ai i form a basis
of the Hilbert space H. Since by convention all the eigenkets are chosen to
14
X
i
ai |ai i hai | ,
where once again we have assumed that |ai i and hai | are of unit length for
all i.
3 =
1
0
0 1
0 1
1 0
2 =
0 i
i
0
3 =
1
0
0 1
Eigenvalue/Eigenket
1
|0i+|1i
1
+1
= 2
2
1
1
|0i|1i
-1
= 12
2
1
1
|0i+i|1i
1
+1
= 2
2
i
1
|0ii|1i
-1
= 12
2
i
1
+1 |0i =
0
0
-1 |1i =
1
15
ai
and forces the state of the quantum system Q into the state of the corresponding eigenket |ai i.
Since quantum measurement is such a hotly debated topic among physicists, we (in self-defense) quote P.A.M. Dirac[25]:
A measurement always causes the (quantum mechanical) system
to jump into an eigenstate of the dynamical variable that is being
measured.
Thus, the result of the above mentioned measurement of observable A of
a quantum system Q which is in the state |i before the measurement can
be diagrammatically represented as follows:
|i =
|ai i hai | i
First
Meas. of A
=
P rob = khaj | ik2
aj |aj i
|aj i
Second
Meas. of A
=
P rob = 1
Please note that the measured value is the eigenvalue aj with probability
k h aj | i k2 . If the same measurement is repeated on the quantum system
Q after the first measurement, then the result of the second measurement is
no longer stochastic. It produces the previous measured value aj and the
state of Q remains the same, i.e., |aj i .
The observable
|ai i hai |
is frequently called a selective measurement operator (or a filtration)
for ai . As mentioned earlier, it has two eigenvalues 0 and 1. 1 is a nondegenerate eigenvalue with eigenket |aj i, and 0 is a degenerate eigenvalue with
eigenkets {|aj i}j6=i .
|aj i
16
Thus,
|i
1 |ai i = |ai i ,
but for j 6= i,
|i
0 |aj i = 0
Rt. Circularly
polarized photon
| i =
1
2
P rob =
=
1
2
=
(|li + i |i)
Measurement op.
|li hl|
=
P rob =
1
2
Vertically
polarized
photon
|li
The last two examples can easily be verified experimentally with at most three pair
of polarized sunglasses.
0
No photon
Vert.
polar.
filter
photon
|li + |i
17
Vert.
polar.
photon =
P rob = kk2
Horiz.
polar.
filter
No
photon
P rob = 1
=
Normalized so that
kk2 + kk2 = 1
|li
|i h|
|li hl|
Example 4. But if we insert a diagonally polarized filter (by 45o off the
vertical) between the two polarized filters in the above example, we have:
kk2
|li =
1
2
1
2
(|%i + |-i)
|li hl|
|%i =
1
2
1
2
(|li + |i)
|i
|i h|
|%i h%|
For, since
X
i
we have
X
hAi = h| A |i = h|
|ai i hai | = 1 ,
X
X
|ai i hai | A
|aj i haj | |i =
h | ai i hai | A |aj i haj | i
!
i,j
18
Thus,
hAi =
X
i
h | ai i ai hai | i =
X
i
ai khai | ik2
4A = A hAi
19
if
U = U 1 .
i} |(t)i = H |(t)i ,
t
where } denotes Plancks constant divided by 2, and where H denotes an
observable of Q called the Hamiltonian. The Hamiltonian is the quantum
mechanical analog of the Hamiltonian of classical mechanics. In classical
physics, the Hamiltonian is the total energy of the system.
4.10. The mathematical perspective.
From the mathematical perspective, Schr
odingers equation is written as:
i
U (t) = H(t)U (t) ,
t
}
where
|(t)i = U |(0)i ,
5
20
U (t) =
e } H(t)dt,
which is taken over the path }i H(t) in the Lie algebra of the unitary group.
The path-ordered integral is given by:
i
e } H(t)dt = lim
0
0
Y
e } H(k n ) n
k=n
h i
i
t
i
t
i
t
i
t
= lim e } H(n n ) e } H((n1) n ) e } H(1 n ) e } H(0 n )
n
Zt
i
P exp
H(t)dt
}
0
e } Hdt = e
0
Rt
0
}i Hdt
= e } Ht
Thus, in this case, U (t) is nothing more than a one parameter subgroup of
the unitary group.
21
The density operator formalism has a number of advantages over the ket
state formalism. One advantage is that the density operator can also be
used to represent hybrid quantum/classical states, i.e., states which are a
classical statistical mixture of quantum states. Such hybrid states may also
be thought of as quantum states for which we have incomplete information.
For example, consider a quantum system which is in the states (each of
unit length)
with probabilities
|1 i , |2i , . . . , |n i
p1, p2, . . . , pn
respectively, where
p1 + p2 + . . . + pn = 1
(Please note that the states |1 i , |2i , . . . , |n i need not be orthogonal.)
Then the density operator representation of this state is defined as
= p1 |1i h1| + p2 |2 i h2| + . . . + pn |n i hn |
If a density operator can be written in the form
= |i h| ,
22
Pai Pai
.
T race (Pai )
23
|li |%i
Prob.
3
4
1
4
In terms of the basis |i, |li of the two dimensional Hilbert space H, the
density operator of the above mixed ensemble can be written as:
=
3
4
3
4
3
4
|li hl| +
1
0
1
4
1 0
0 0
|%i h%|
1 0
1
8
1
4
1 1
1 1
1/2
1/ 2
1/ 2 1/ 2
7
8
1
8
1
8
1
8
|li |i
Prob.
1
2
and
1
2
Ket
|%i |-i
Prob.
1
2
1
2
1
2
1
2
1
2
|li hl| +
1
0
1 0
0 1
1
2
|i h|
1 0
1
2
0
1
0 1
24
1
2
1 1
2 2
1
4
1
1
1 1
1 1
1
2
1 1
1
4
1 1
2 2
1 1
1
1
1
1
1
2
1
2
1 0
0 1
1 1
Since Hilbert spaces are free algebraic objects, it follows from standard
results in abstract algebra7 that
HomC (H, H)
= H H ,
H = HomC (H, C) .
25
n
O
Hj .
j=1
Then it follows once again from standard results in abstract algebra that
HomC (H, H)
=
n
O
j=1
Hj Hj
n
O
j=1
|h,j i hk,j | ,
where, for each j, the kets |h,j i lie in Hj and the bras hk,j | lie in Hj for
all .
Next we note that for every subset I of the set of indices J = {1, 2, . . . , n},
we can define the partial trace over I, written
O
O
O
O
Hj ,
Hj
Hj ,
Hj HomC
T raceI : HomC
jJ
jJ
jJ I
jJ I
X
Y
O
T raceI (O) =
a
h k,j | h,j i
| h,j i h k,j | .
jI
jJ I
For example, let H1 and H0 be two dimensional Hilbert spaces with selected orthonormal bases {|01 i , |11i} and {|00i , |10 i}, respectively. Thus,
{|01 00i , |01 10i , |11 00i , |11 10i} is an orthonormal basis of H = H1 H0 .
26
2
2
1
= (|0100i h01 00| |01 00i h1110 | |1110i h01 00| + |11 10i h1110 |)
2
which in terms of the basis {|01 00i , |01 10i , |11 00i , |11 10i} can be written as
the matrix
1 0 0 1
1 0 0 0
0
,
=
0
2 0 0 0
1 0 0
1
where the rows and columns are listed in the order |0100i, |0110 i, |1100 i,
|11 10i
The partial trace T race0 with respect to I = {0} of is
1 = T race0 ()
1
= T race0 (|01 00i h01 00| |0100 i h1110 | |11 10i h01 00| + |1110 i h1110 |)
2
1
= (h00 | 00i |01i h01 | h10 | 00i |01i h11 | h00 | 10i |11 i h01 | + h10 | 10i |11 i h11|)
2
1
= (|01 i h01| |01i h11 |)
2
which in terms of the basis {|01i , |11 i} becomes
1 1 0
1 = T race0() =
,
2 0 1
where the rows and columns are listed in the order |01 i, |11i .
n
O
j=1
Hj .
27
i}
= [H, ] ,
t
where [H, ] denotes the commutator of H and , i.e.,
[H, ] = H H
5.8. The mathematical perspective.
From the mathematical perspective, one works with i instead of because i lies in the Lie algebra of the unitary group. Thus, the density operator transforms under a unitary transformation U according to the rubric:
i 7 AdU (i) ,
where AdU denotes the big adjoint representation.
From the mathematical perspective, Schr
odingers equation is in this case
more informatively written as:
1
(i)
= adiH (i) ,
t
}
8
Schr
odingers equation determines the dynamics of closed quantum systems. However,
non-closed quantum systems are also of importance in quantum computation and quantum
information theory. See for example the Schumachers work on superoperators, e.g., [76].
28
e
=
t
Consider a computing device with inputs and outputs for which we have
no knowledge of the internal workings of the device. We are allowed to
probe the device with inputs and observe the corresponding outputs. But
we are given no information as to how the device performs its calculation.
We call such a device a blackbox computing device.
For such blackboxes, we say that two theoretical models for blackboxes
are equivalent provided both predict the same input/output behavior. We
may prefer one model over the other for various reasons, such as simplicity,
aesthetics, or whatever meets our fancy. But the basic fact is that each of
the two equivalent models is just as correct as the other.
In like manner, two theoretical models of the quantum world are said to
be equivalent if they both predict the same results in regard to quantum
measurements.
Up to this point, we have been describing the Schr
odinger model of quantum mechanics. However, shortly after Schr
odinger proposed his model
for the quantum world, called the Schr
odinger picture, Heisenberg proposed yet another, called the Heisenberg picture. Both models were
later proven to be equivalent.
In the Heisenberg picture, state kets remain stationary with time, but
observables move with time. While state kets, and hence density operators,
remain fixed with respect to time, the observables A change dynamically as:
A 7 U AU
under a unitary transformation U = U (t), where the unitary transformation
is determined by the equation
i}
U
= HU
t
29
i}
A
= [A, H]
t
30
In summary, we have the following table which contrasts the two pictures:
State ket
Density
Operator
Schr
odinger Picture
Moving
Heisenberg Picture
Stationary
|0i 7 |i = U |0i
|0 i
Moving
Stationary
0 7 = U 0U = AdU (0 )
Stationary
Moving
A0
A0 7 A = U A0 U = AdU (A0)
Stationary
Stationary
aj
aj
Observable
Observable
Eigenvalues
Observable
Frame
Stationary
P
A0 = j aj |aj i0 haj |0
Moving
P
A0 = j aj |aj i0 haj |0
At =
aj |aj it haj |t
Dynamical
Equations
Measurement
(S)
i} U
U
t = H
(H)
i} U
U
t = H
i} t
|i = H (S) |i
(H)
i} A
t = A, H
Measurement of observable A0
produces eigenvalue aj with
probability
haj | |i2 = haj | |i2
0
where
H (H) = U H (S) U
Measurement of observable A
produces eigenvalue aj with
probability
haj | |0i2 = haj | |i2
t
31
U
where terms containing U
t and t have cancelled out as a result of the
Schr
odinger equation.
We should also mention that the Schr
odinger and Heisenberg pictures can
be transformed into one another via the mappings:
S H
H S
(S)
7 (H) = U (S)
(H)
7 (S) = U (H)
32
1
1
1
|i = (|0n1 i + |1n1 i) (|0n2 i + |1n2 i) . . . (|00i + |10i)
2
2
2
1 n
=
(|0n1 0n2 . . . 0100i + |0n1 0n2 . . . 01 10i + . . . + |1n1 1n2 . . . 1110i)
2
which lies in the Hilbert space
H = Hn1 Hn2 . . . H0 .
Notational Convention: We will usually omit subscripts whenever they
can easily be inferred from context.
Thus, the global system Q consisting of the n qubits Qn1 , Qn2 , . . . ,
Q0 is in the state
n1
O
1 n
|i =
(|00 . . . 00i + |00 . . . 01i + . . . + |11 . . . 11i)
H
2
0
The reader should note that the n-qubit register Q is a superposition of
kets with labels consisting of all the binary n-tuples. If each binary n-tuple
bn1 bn2 . . . b0 is identified with the integer
bn1 2n1 + bn2 2n2 + . . . + b020 ,
9
33
0
1
1
|0i = |00i =
0
0
0
1
1
0
|1i = |01i =
0
0
1
0
0
1
|2i = |10i =
1
1
0
0
0
0
|3i = |11i =
0
1
1
In terms of the
34
Let us assume that the initial state |it=0 of our 2-qubit register is
1
|0i |1i
1
1
1
0
|it=0 =
|0i = (|00i |10i) = (|0i |2i) =
1
2
2
2
2
0
Let us also assume that from time t = 0 to time t = 1 the dynamical
behavior of the above 2-qubit register is determined by a constant Hamiltonian H, which when written in terms of the basis {|00i , |01i , |10i , |11i} =
{|0i , |1i , |2i , |3i} is given by
0 0
0
0
}
0
0
,
0 0
H=
0 0
1 1
2
0 0 1
1
where the rows and the columns are listed in the order |00i, |01i, |10i, |11i,
i.e., in the order |0i, |1i, |2i, |3i.
Then, as a consequence of Schr
odingers equation, the Hamiltonian H
determines a unitary transformation
UCN OT =
1
0
=
0
0
e } Hdt = e
0
0
1
0
0
0
0
0
1
R1
0
}i Hdt
= e } H
0
0
= |0i h0| + |1i h1| + |2i h3| + |3i h2|
1
0
which moves the 2-qubit register from the initial state |it=0 at time t = 0
to |it=1 = UCN OT |it=0 at time t = 1. Then
1 0 0 0
1
0 1 0 0 1 0
1
0
= 1 (|00i |11i) = 1 (|0i |3i)
=
0
2
2
2
1
The resulting state (called an EPR pair of qubits for reasons we shall
later explain) can no longer be written as a tensor product of two states.
Consequently, we no longer have the juxtaposition of two qubits.
35
Somehow, the resulting two qubits have in some sense lost their separate
identities. Measurement of any one of the qubits immediately impacts the
other.
For example, if we measure the 0-th qubit (i.e., the right-most qubit), the
EPR state in some sense jumps to one of two possible states. Each of the
two possibilities occurs with probability 21 , as indicated in the table below:
1
2
(|0100 i |1110 i)
...
Meas.
0-th
Qubit
P rob = 21
|0100 i
&&&
P rob = 21
|11 10i
Thus we see that a measurement of one of the qubits causes a change in the
other.
n
O
j=1
|j i ,
We
36
n
O
j ,
j=1
`
X
k=1
n
O
Hj
j=1
n
O
k
(j,k) ,
j=1
for some positive integer `, where the k s are positive real numbers such
that
`
X
k = 1 .
k=1
and where each (j,k) is a density operator on the Hilbert space Hj.
Readers interested in pursuing this topic further should refer to the works
of Bennett , the Horodeckis, Nielsen, Smolin, Wootters , and others[6], [45],
[59], [67].
7.5. Einstein, Podolsky, Rosens (EPRs) grand challenge to quantum mechanics.
Albert Einstein was skeptical of quantum mechanics, so skeptical that he
together with Podolsky and Rosen wrote a joint paper[26] appearing in 1935
challenging the very foundations of quantum mechanics. Their paper hit
the scientific community like a bombshell. For it delivered a direct frontal
attack at the very heart and center of quantum mechanics.
10
37
38
where c denotes the speed of light. In other words, no signal can travel
between points that are said to be separated by a spacelike distance unless
the signal travels faster than the speed of light. But because of the basic
principles of relativity, such superluminal communication is not possible.
Hence we have:
The principle of non-locality: Spacelike separated regions of spacetime are physically independent. In other words, spacelike separated
regions can not influence one another.
7.6.1. EPRs objection.
We now are ready to explain why Einstein and his colleagues objected
so vehemently to quantum entanglement. We explain Bohms simplified
version of their argument.
Consider a two qubit quantum system that has been prepared by Alice
in her laboratory in the state
1
|i = (|01 00i |1110 i) .
2
After the preparation, she decides to keep qubit #1 in her laboratory, but
enlists Captain James T. Kirk of the Starship Enterprise to transport qubit
#0 to her friend Bob 14 who is at some far removed distant part of the
universe, such as at a Federation outpost orbiting about the double star
Alpha Centauri in the constellation Centaurus.
13
After Captain Kirk has delivered qubit #0, Alices two qubits are now
separated by a spacelike distance. Qubit #1 is located in her Earth based
laboratory. Qubits #0 is located with Bob at a Federation outpost orbiting
Alpha Centauri. But the two qubits are still entangled, even in spite of the
fact that they are separated by a spacelike distance.
If Alice now measures qubit #1 (which is located in her Earth based
laboratory), then the principles of quantum mechanics force her to conclude
that instantly, without any time lapse, both qubits are effected. As a
13
39
result of the measurement, both qubits will be either in the state |0100 i or
the state |11 10i, each possibility occurring with probability 1/2.
This is a non-local interaction. For,
The interaction occurred without the presence of any force. It was
not mediated by anything.
The measurement produced an instantaneous change, which was certainly faster than the speed of light.
The strength of the effect of the measurement did not drop off with
distance.
No wonder Einstein was highly skeptical of quantum entanglement. Yet
puzzlingly enough, since no information is exchanged by the process, the
principles of general relativity are not violated. As a result, such an effect
can not be used for superluminal communication.
For a more in-depth discussion of the EPR paradox and the foundations
of quantum mechanics, the reader should refer to [13].
7.7. Quantum entanglement: The Lie group perspective.
Many aspects of quantum entanglement can naturally be captured in
terms of Lie groups and their Lie algebras.
Let
H = Hn1 Hn2 . . . H0 =
n1
Hj
40
is called the local Lie algebra, where denotes the Kronecker sum15.
where AdU denotes the big adjoint representation, i.e., AdU (i) = U (i)U .
The equivalence classes under this relation are called entanglement classes
of the Lie algebra u(H).
Thus, the entanglement classes of the Hilbert space H are just the orbits
of the group action of L(H) on H. In like manner, the entanglement classes
of the Lie algebra u(H) are the orbits of the big adjoint action of L(H) on
u(H). Two states are entangled in the same way if and only if they lie in
the same entanglement class, i.e., the same orbit.
For example, let us assume that Alice and Bob collectively possess two
qubits QAB which are in the entangled state
1
1
|0B 0A i + |1B 1A i
0
,
=
|1 i =
0
2
2
1
15
B is defined as
A
B = A1+1B ,
41
and moreover that Alice possesses qubit labeled A, but not the qubit labeled
B, and that Bob holds qubit B, but not qubit A. Let us also assume that
Alice and Bob are also separated by a spacelike distance. As a result, they
can only apply local unitary transformations to the qubits that they possess.
Alice could, for example, apply the local unitary transformation
0
0 1 0
0
0 0 1
1 0
0 1
UA =
1
0 0 0
0 1
1 0
0 1 0 0
to her qubit to move Alices and Bobs qubits A and B respectively into the
state
0
|0B 1A i |1B 0A i
1 1
,
|2i =
=
2
2 1
0
Bob also could accomplish the same by applying the local unitary transformation
0
1
0
0
1
1 0
0 1
0 0
0
UB =
=
0
0 1
1
0
0 0 1
0
0 1
0
to his qubit.
By local unitary transformations, Alice and Bob can move the state of
their two qubits to any other state within the same entanglement class.
But with local unitary transformations, there is no way whatsoever that
Alice and Bob can transform the two qubits into a state lying in a different
entanglement class (i.e., a different orbit), such as
|3i = |0B 0A i .
The only way Alice and Bob could transform the two qubits from state
|1 i to the state |3i is for Alice and Bob to come together, and make the
two qubits interact with one another via a global unitary transformation
such as
1
0 0 1
1 0
1 1 0
UAB =
2 0 1 1 0
1
0 0 1
The main objective of this approach to quantum entanglement is to determine when two states lie in the same orbit or in different orbits? In other
words, what is needed is a complete set of invariants, i.e., invariants that
42
completely specify all the orbits ( i.e., all the entanglement classes).
save this topic for another lecture[61].
We
At first it would seem that state kets are a much better vehicle than
density operators for the study of quantum entanglement. After all, state
kets are much simpler mathematical objects. So why should one deal with
the additional mathematical luggage of density operators?
Actually, density operators have a number of advantages over state kets.
The most obvious advantage is that density operators certainly have an upper hand over state kets when dealing with mixed ensembles. But their
most important advantage is that the orbits of the adjoint action are actually manifolds, which have a very rich and pliable mathematical structure.
Needless to say, this topic is beyond the scope of this paper.
Remark 8. It should also be mentioned that the mathematical approach
discussed in this section by no means captures every aspect of the physical
phenomenon of quantum entanglement. The use of ancilla and of classical
communication have not been considered. For an in-depth study of the relation between quantum entanglement and classical communication (including
catalysis), please refer to the work of Jonathan, Nielson, and others[67].
In regard to describing the locality of unitary operations, we will later have
need for a little less precision than that given above in the above definitions.
So we give the following (unfortunately rather technical) definitions:
Definition 8. Let H, Hn1 , Hn2 , . . . ,H0 be as stated above. Let P =
{B } be a partition of the set of indices {0, 1, 2, . . . , n 1}, i.e., P is a
collection
of disjoint subsets B of {0, 1, 2, . . . , n 1}, called blocks, such
S
that B = {0, 1, 2, . . . , n 1}. Then the P-tensor product decomposition of H is defined as
O
H=
HB ,
where
B P
HB =
jB
Hj ,
for each block B in P. Also the subgroup of P-local unitary transformations LP (H) is defined as the subgroup of local unitary transformations
of H corresponding to the P-tensor decomposition of H.
We define the fineness of a partition P, written f ineness(P), as the
maximum number of indices in a block of P. We say that a unitary transformation U of H is sufficiently local if there exists a partition P with sufficiently small f ineness(P) (e.g., f ineness(P) 3) such that U LP (H).
43
Let S be a probability distribution on a finite set {s1 , s2, . . . , sn } of elements called symbols given by
Prob (sj ) = pj ,
P
where nj=1 pj = 1. Let s denote the random variable (i.e., finite memoryless stochastic source) that produces the value sj with probability
pj .
44
|1i
p1
|2 i
p2
...
...
|n i
pn
which will produce the same state . These preparations are classical stochastic sources with classical entropy given by
X
H = pj lg(pj ) .
( I)n
1 X
(1)n+1
lg =
ln 2 n=1
n
k Ik < 1 ,
kAvk
.
vH kvk
kAk = sup
It can be shown that this is the case for all positive definite Hermitian operators of trace 1.
For Hermitian operators of trace 1 which are not positive definite, but
only positive semi-definite (i.e., which have a zero eigenvalue), the logarithm
45
lg() does not exist. However, there exists a sequence 1 , 2, 3, . . . of positive definite Hermitian operators of trace 1 which converges to , i.e., such
that
= lim k
k
exists.
Hence, S() is defined and exists for all density operators .
Quantum entropy is a measure of the uncertainty at the quantum level.
As we shall see, it is very different from the classical entropy that arises
when a measurement is made.
One important feature of quantum entropy S() is that it is invariant
under the adjoint action of unitary transformations, i.e.,
S ( AdU () ) = S U U = S() .
U U = 4( ) ,
S() = T race 4( ) lg 4( )
= T race ( 4(1 lg 1, 2 lg 2, . . . , n lg n ) )
n
X
= j lg j ,
j=1
46
47
part Qj is given by the partial trace over all degrees of freedom except
Qj , i.e., by
j =
T race ()
.
0 k n1
k 6= j
By applying the above partial trace, we are focusing only on the quantum
system Qj , and literally ignoring the remaining constituent parts of Q.
By taking the partial trace, we have done nothing physical to the quantum
system. We have simply ignored parts of the quantum system.
What is surprising is that, by intentionally ignoring part of the quantum system, we can in some cases create more quantum uncertainty. This
happens when the constituent parts of Q are quantum entangled.
For example, let Q denote the bipartite quantum system consisting of two
qubits Q1 and Q0 in the entangled state
|01 00i |11 10i
.
|Q i =
2
The corresponding density operator Q is
1
Q = (|01 00i h0100 | |0100 i h1110| |11 10i h01 00| + |1110 i h1110|)
2
1 0 0 1
1 0 0 0
0
0 0 0
0
2
1 0 0
1
Since Q is a pure ensemble, there is no quantum uncertainty, i.e.,
S (Q ) = 0 .
Let us now focus on qubit #0 (i.e., Q0). The resulting density operator
0 for qubit #0 is obtained by tracing over Q1 , i.e.,
1
1 1 0
0 = T race1 (Q) = ( |0i h0| + |1i h1| ) =
.
2
2 0 1
48
than that of he whole quantum system Q. This is not possible in the classical world, i.e., not possible for Shannon entropy. (For more details, see
[15].)
Part 3.
49
Input
xn1
xn1
..
.
..
.
x1
x0
..
.
CRCDn
yn1
yn1
..
.
y1
y0
Output
Each classical n-input/n-output (binary memoryless) reversible computing device (CRCDn) can be identified with a bijection
: {0, 1}n {0, 1}n
on the set {0, 1}n of all binary n-tuples. Thus, we can in turn identify each
CRCDn with an element of the permutation group S2n on the 2n symbols
{ h
a| |
a {0, 1}n } .
Let
denote the free Boolean ring on the symbols x0 , x1, . . . , xn1 . Then
a x a =
where
n1
Y
xj j ,
j=0
0
xj = xj
x1j = xj
50
can also be identified with the automorphism group Aut (Bn ) of the free
Boolean ring Bn .
Moreover, since the set of binary n-tuples {0, 1}n is in one-to-one correspondence with the set of integers {0, 1, 2, . . . , 2n 1} via the radix 2
representation of integers, i.e.,
(bn1 , bn2 , . . . , b1, b0)
n1
X
bj 2j ,
j=0
b+c
b
where and denote respectively a control bit and a target bit, and
where a + b denotes the exclusive or of bits a and b. This corresponds to
the permutation = (26)(37), i.e.,
|2i
= |010i 7 |110i = |6i
|4i
=
|100i
|100i
=
|4i
|6i
= |110i 7 |010i = |2i
First=Right=Bottom
Last=Left=Top
Toffoli =
c c + ab
|
b
b
|
a
a
51
and where denotes exclusive or. Thus, the image of each Boolean
function f is a product of disjoint transpositions in S2n .
As an additive group (ignoring ring structure), Bn1 is the abelian group
L2(n1) 1
Z2 , where Z2 denotes the cyclic group of order two.
j=0
L2(n1) 1
j=0
Z2 S2n = Aut(Bn )
52
1 if k = `
k` =
0 otherwise
CNOT0 =
1 0 0
0 1 0
0 0 1
0 0 0
0
UCNOT0 = (CNOT ) =
0 0 0
0 0 0
0 0 0
0 0 0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
Toffoli0 =
1 0 0 0
0 1 0 0
0 0 1 0
0 0 0 1
0
0
UToffoli = (Toffoli ) =
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
53
1
b a + b
0
|
=
CNOT00 =
0
a
a
0
quantum computing
0
1
0
0
0
0
0
1
0
0
1
0
For completeness, we list two other quantum computing devices that are
embeddings of CRCDn s, NOT and SWAP:
0 1
= 1
NOT = a NOT a + 1 =
1 0
and
a
|
|
|
a b
b
SWAP =
1
0
=
0
0
0
0
1
0
0
1
0
0
0
0
0
1
54
1
=
2
1
1
1 1
Another quantum gate is the square root of NOT, i.e., NOT, which
is given by
1i
1+i
i 1
1 i
NOT = NOT =
=
.
1 i
i
1
2
2
SWAP =
SWAP
1 0
0 0
0 1+i 1i 0
2
2
=
0 1i 1+i 0 .
2
2
0 0
0 1
i3
cos sin
sin cos
ei
0
0 ei
= ei2
= ei3
55
CNOT =
a + b
|
a
a
b
The above wiring diagram defines CNOT00 in terms of the implicitly understood basis
0
1
.
, |1i =
|0i =
1
0
This wiring diagram suggests that qubit #1 controls qubit #0, and that
qubit #1 is not effected by qubit #0. But this is far from the truth. For,
CNOT00 transforms
|0i + |1i |0i |1i
2
2
into
|0i |1i |0i |1i
,
2
2
where we have used our indexing conventions
First=Right=Bottom
.
Last=Left=Top
In fact, in the basis
0 |0i + |1i 0 |0i |1i
0 =
, 1 =
2
2
the wiring diagram of the same unitary transformation CNOT00 is:
b a + b
|
a
a
The roles of the target and control qubits appeared to have switched!
11. The No-Cloning Theorem
56
for all states |ai H, where |ai HA (called the replicator state after
replication of |ai) depends on |ai.
Since a quantum state is determined by a ket up to a multiplicative nonzero complex number, we can without loss of generality assume that |0i,
|ai, |blanki are all of unit length. From unitarity, it follows that |ai is also
of unit length.
Let |ai, |bi be two kets of unit length in H such that
0<|ha|bi|<1.
Then
Hence,
|b i |bi |bi
Thus,
And so,
h a | b i 2 h a | b i = h a | b i .
h a | b i h a | b i = 1 .
57
We now give a brief description of quantum teleportation, a means possibly to be used by future quantum computers to bus qubits from one location
to another.
As stated earlier, qubits can not be copied as a result of the no-cloning
theorem. (Please refer to the previous section.) However, they can be
teleported, as has been demonstrated in laboratory settings. Such a mechanism could be used to bus qubits from one computer location to another.
It could be used to create devices called quantum repeaters.
58
Unitary
Matrix
H2 H 3
|01i|10i
H2 H 3
|i = (a |0i + b |1i)
H1 H 2 H3
2
To better understand what is about to happen, we re-express the state
|i of the three qubits in terms of the following basis (called the Bell basis)
of H1 H2 :
|A i = |10i|01i
|10i+|01i
|B i =
2
|C i =
|D i =
|00i|11i
|00i+|11i
59
|i =
|A i (a |0i b |1i)
+ |B i (a |0i + b |1i)
+ |C i (a |1i + b |0i)
+ |D i (a |1i b |0i) ]
where, as you might have noticed, we have written the expression in a suggestive way.
Remark 11. Please note that since the completion of Step 3, we have done
nothing physical. We have simply performed some algebraic manipulation
of the expression representing the state |i of the three qubits.
Let U : H1 H2 H1 H2 be the unitary transformation defined by
|A i 7 |00i
|B i 7 |01i
|C i
7 |10i
|D i
7 |11i
|0i =
60
Step 7. (Location B): The two bits (i, j) received from location A are
used to select from the following table a unitary transformation U (i,j)
of H3 , (i.e., a local unitary transformation I4 U (i,j) on H1 H2 H3 )
Rec. Bits
00
01
10
11
U (i,j)
1
U (00) =
0
1
U (01) =
0
0
U (10) =
1
0
U (11) =
1
0
1
0
1
1
0
1
0
It is indeed amazing that no one knows the state of the quantum teleported qubit except possibly the individual that prepared the qubit. Knowledge of the actual state of the qubit is not required for teleportaton. If its
state is unknown before the teleportation, it remains unknown after the
teleportation. All that we know is that the states before and after the
teleportation are the same.
61
However, ... Peter Shor suddenly changed the rules of the game.
Hidden in the above conjecture is the unstated, but implicitly understood,
assumption that all algorithms run on computers based on the principles of
classical mechanics, i.e., on classical computers. But what if a computer
could be built that is based not only on classical mechanics, but on quantum
mechanics as well? I.e., what if we could build a quantum computer?
Shor, starting from the works of Benioff, Bennett, Deutsch , Feynman,
Simon, and others, created an algorithm to be run on a quantum computer, i.e., a quantum algorithm, that
factors integers in polynomial
time!
2
Shors algorithm takes asymptotically O (lg N ) (lg lg N ) (lg lg lg N ) steps
on a quantum computer, which is polynomial time in the number of digits
O (lg N ) of N .
20
62
63
Step 1. Choose a random positive even integer m. Use the polynomial time
Euclidean algorithm21 to compute the greatest common divisor gcd (m, N )
of m and N . If the greatest common divisor gcd (m, N ) 6= 1, then we
have found a non-trivial factor of N , and we are done. If, on the other
hand, gcd (m, N ) = 1, then proceed to STEP 2.
STEP 2. Use a quantum computer to determine the unknown period P of
the function
f
N
N
N
a 7 ma mod N
Step 5. Use the Euclidean algorithm to compute d = gcd mP/2 1, N . Since
21
f : N N ,
64
L1
X
aj 2j ,
j=0
L1
O
j=0
|aj i
65
M ap(SQ, C) M ap(SQ , C)
h
i
[f : SQ C] 7 fb : SQ C
where
1 X
f (x) xy
fb(y) =
Q
xSQ
This unitary transformation can be factored into the product of O lg2 Q =
O lg2 N sufficiently local unitary transformations. (See [77], [47].)
13.5. The quantum part of Shors algorithm.
The quantum part of Shors algorithm, i.e., STEP 2, is the following:
STEP 2.0 Initialize registers 1 and 2, i.e.,
STEP 2.1
Q1
Q1
1 X 0x
1 X
|0i = |0i |0i 7 |1i =
|xi |0i =
|xi |0i
Q x=0
Q x=0
FI
22
In this step we could have instead applied the Hadamard transform to Register1
with the same result, but at the computational cost of O (lg N ) sufficiently local unitary
transformations.
66
STEP 2.2 Let Uf be the unitary transformation that takes |xi |0i to |xi |f (x)i.
Apply the linear transformation Uf to the two registers. The result
is:
Q1
Q1
Uf
1 X
1 X
|xi |0i 7 |2i =
|xi |f (x)i
|1i =
Q x=0
Q x=0
Remark 13. The state of the two registers is now more than a superposition
of states. In this step, we have quantum entangled the two registers.
STEP 2.3. Apply the Q-point Fourier transform F to Reg1. The resulting state
is:
|2i =
1
Q
Q1
X
x=0
FI
|xi |f (x)i 7 |3 i =
1
Q
1
Q
Q1
X
X Q1
x=0 y=0
Q1
X
y=0
xy |yi |f (x)i
|(y)i
where
|(y)i =
Q1
X
x=0
xy |f (x)i .
STEP 2.4. Measure Reg1, i.e., perform a measurement with respect to the orthogonal projections
|0i h0| I, |1i h1| I, |2i h2| I, . . . , |Q 1i hQ 1| I ,
where I denotes the identity operator on the Hilbert space of the second
register Reg2.
As a result of this measurement, we have, with probability
P rob (y0 ) =
k|(y0 )ik2
,
Q2
|(y0 )i
k|(y0 )ik
y0 {0, 1, 2, . . . , Q 1} .
67
If after this computation, we ignore the two registers Reg1 and Reg2, we
see that what we have created is nothing more than a classical probability
distribution S on the sample space
{0, 1, 2, . . . , Q 1} .
In other words, the sole purpose of executing STEPS 2.1 to 2.4 is to create
a classical finite memoryless stochastic source S which outputs a symbol
y0 {0, 1, 2, . . . , Q 1} with the probability
P rob(y0) =
k|(y0 )ik2
.
Q2
P rob (y) =
r sin2
P y
Q0
+1
P
+(P r) sin2
Q2 sin2
r(Q0 +P ) 2 +(P r)Q20
Q2 P 2
P y
Q
P y Q0
P
Q
if P y 6= 0 mod Q
if P y = 0 mod Q
68
Q1
X
P
1
X
xy
x=0
|f (x)i =
Q0
1
P
x0 =0 x1 =0
P
1
X
x0 =0
r1
X
x0 =0
x0 y
QX
0 1
xy
x=0
|f (x)i +
Q1
X
x=Q0
(P x1 +x0 )y |f (P x1 + x0 )i +
xy |f (x)i
r1
X
Q0
P
x0 =0
Q
0 1
r1
P
X
Py
X P yx1
x0 y
|f (x0)i +
x1 =0
Q0
P
Q0
P
x0 =0
X P yx1
x0 y
|f (x0)i +
x1 =0
i
+x0 y
P
1
X
x0 =r
x0 y
|f (P x1 + x0 )i
|f (x0)i
Q
0 1
P
X P yx1
|f (x0)i
x1 =0
1
+ (P r))
h(y) | (y)i =
P
y
P
y
1
1
2
2
Q0
Q0
2i
2i
e Q P y P 1
e Q P y P +1 1
=
2i
2i
+ (P r))
P y
P y
Q
Q
e
1
e
1
69
where we have used the fact that is the primitive Q-th root of unity given
by
= e2i/Q .
The remaining part of the proposition is a consequence of the trigonometric identity
2
i
2
.
e 1 = 4 sin
2
As a corollary, we have
Corollary 1. If P is an exact divisor of Q, then
0 if P y 6= 0 mod Q
P rob (y) =
1
if P y = 0 mod Q
P
13.7. A momentary digression: Continued fractions.
We digress for a moment to review the theory of continued fractions. (For
a more in-depth explanation of the theory of continued fractions, please refer
to [42] and [58].)
Every positive rational number can be written as an expression in the
form
1
,
= a0 +
1
a1 +
1
a2 +
1
a3 +
1
+
aN
where a0 is a non-negative integer, and where a1 , . . . , aN are positive integers. Such an expression is called a (finite, simple) continued fraction ,
and is uniquely determined by provided we impose the condition aN > 1.
For typographical simplicity, we denote the above continued fraction by
[a0 , a1, . . . , aN ] .
The continued fraction expansion of can be computed with the following
recurrence relation, which always terminates if is rational:
a0 = bc
an+1 = b1/n c
, and if n 6= 0, then
1
0 = a0
n+1 = n an+1
70
q 1 = a1 ,
qn = an qn1 + qn2 .
a = {a}Q mod Q
.
4
1
1 2
if 0 < {P y}Q
2 P 1 N
P rob (y)
1
1 2
if {P y}Q = 0
P 1 N
Proof. We begin by noting that
{P y}
Q
P
2 1
Q Q P0 + 1 Q
1
N
1
N
Q0 +P
1+
P
Q
.
Q
P 2
j
23
{a}Q = a Q round
a
Q
=aQ
a
Q
1
2
P
2
1
N
1
N
1
N
Q+P
1+
N
N2
<
71
r sin2
P rob (y) =
+(P r) sin2
{P y}Q
Q0
+1
P
+(P r)
4
2
4
2
1
P
Q0
P
Q2
Qr
Q
4
2
1
P
1
4
2
1
P
r
Q
2
{P y}Q Q
P0
Q
{P y}Q
Q
Q2
{P y}Q Q
P0
Q
P y
Q
Q2 sin2
Q0
+1
P
2
1 2
N
and
SP = {d SQ | 0 d < P } .
Y
y
SP
P
7 d = d(y) = round Q
y
y = y(d) = round
Q
d
P
72
d(y)
P
is a convergent
Proof. Since
P y Qd(y) = {P y}Q ,
we know that
|P y Qd(y)|
which can be rewritten as
P
,
2
y
d(y) 1 .
Q
P 2Q
applied. Thus,
y
=Q
.
d(y)
P
1
2N
1
),
2P 2
d(y)
y
Q,
it
73
pn = d(y)
,
qn = P
P
N
where (P ) denotes Eulers totient function, i.e., (P ) is the number of
positive integers less than P which are relatively prime to P .
The following theorem can be found in [42, Theorem 328, Section 18.4]:
Theorem 3.
lim inf
(N )
= e ,
N/ ln ln N
e (P )
1 2
4
,
2 ln 2
lg lg N
N
74
P
ln ln P
ln ln N
ln ln 2 + ln lg N
ln 2
lg lg N
LB(P )
0.062
0.163
0.194
0.303
0.326
0.375
0.383
0.411
0.425
0.435
0.468
75
End of Loop
If you happen to reach this point, you are a very unlucky quantum
computer scientist. You must start over by returning to STEP
2.0. But dont give up hope! The probability that the integer y
produced by STEP 2.4 will lead to a successful completion of Step
2.5 is bounded below by
4
e (P )
1 2
0.232
1 2
1
>
1
,
2 ln 2
lg lg N
N
lg lg N
N
provided the period P is greater than 3.
constant.]
25
[ denotes Eulers
The indicated algorithm for computing mqn mod N requires O(lg qn ) arithmetic
operations.
76
0 1 2
6 7
1 3 9 27 81 61 1 3
Unknown period P = 6
STEP 2.0 Initialize registers 1 and 2. Thus, the state of the two registers becomes:
|0i = |0i |0i
STEP 2.1 Apply the Q-point Fourier transform F to register #1, where
16383
X
1
F |ki =
kj |xi ,
16384 x=0
2i
77
STEP 2.2 Apply the unitary transformation Uf to registers #1 and #2, where
Uf |xi |`i = |xi | f (x) ` mod 91i .
(Please note that Uf2 = I.) Thus, the state of the two registers becomes:
|2 i =
1
16384
1
(
16384
P16383
x=0
Remark 18. The state of the two registers is now more than a superposition
of states. We have in the above step quantum entangled the two registers.
STEP 2.3 Apply the Q-point F again to register #1. Thus, the state of the
system becomes:
|3 i =
where
1
16384
1
16384
1
16384
P16383
x=0
P16383
x=0
P16383
x=0
| (y)i =
1
16384
|yi
P16383
P16383
x=0
y=0
|yi | (y)i ,
16383
X
x=0
78
Thus,
|1i + y |3i + 2y |9i + 3y |27i + 4y |81i + 5y |61i
| (y)i =
STEP 2.4 Measure Reg1. The result of our measurement just happens to turn
out to be
y = 13453
Unknown to us, the probability of obtaining this particular y is:
0.3189335551 106 .
d = d(y) = round(
79
0
0
0
1
1
1
1
1
2
4
4
5
3 4 5 6
7
8
9 10
11
12
13
14
1 1 2 3
1
1
3
1
1
1
1
3
5 9 23 78 101 179 638 817 1455 2272 3727 13453
6 11 28 95 123 218 777 995 1772 2767 4539 16384
80
and denote the label of the unknown marked record by x0 . We are given
an oracle which computes the n bit binary function
defined by
f (x) =
1 if x = x0
0 otherwise
81
N
1
O
0
H2 .
Uf
H H2
|x0i if x = x0
f (x)
I|x0 i (|xi) = (1)
|xi =
|xi
otherwise
That I|x0 i is computationally equivalent to Uf follows from the easily verifiable fact that
|0i |1i
|0i |1i
,
= I|x0 i (|xi)
Uf |xi
2
2
26
Please note that Uf = ( ) (f ), as defined in sections 10.3 and 10.4 of this paper.
82
and also from the fact that Uf can be constructed from a controlled-I|x0 i
and two one qubit Hadamard transforms. (For details, please refer to [51],
[53].)
83
1) Both SC and SR are invariant under the transformations I|i , I|i , and
hence I|i I|i, i.e.,
I|i (SC ) = SC
and
I|i (SR) = SR
I|i (SC ) = SC
and
I|i (SR) = SR
and
2) If L| i is the line in the plane SR which passes through the origin and
which is perpendicular to |i, then I|i restricted to SR is a reflection in
(i.e., a M
obius inversion [2] about) the line L| i. A similar statement
can bemade in regard to |i.
3) If is a unit length vector in SR perpendicular to |i, then
I|i = I| i .
(Hence, | is real.)
where
H
(2)
1
1
1 1
84
Both |0i and the unknown state |x0i lie in the Euclidean plane SR =
SpanR (|0 i , |x0 i). Our strategy is to rotate within the plane SR the state
|0 i about the origin until it is as close as possible to |x0 i. Then a measurement with respect to the standard basis of the state resulting from rotating
|0 i, will produce |x0i with high probability.
To achieve this objective, we use the oracle I|x0 i to construct the unitary
transformation
Q = HI|0i H 1I|x0 i ,
which by proposition 2 above, can be reexpressed as
Q = I|0 i I|x0 i .
Let x
i
0 and 0 denote unit length vectors in SR perpendicular to |x0
and |0i, respectively. There are two possible choices for each of x0
and 0 respectively.
this minor, but nonetheless annoying,
To remove
ambiguity, we select x0 and 0 so that the orientation of the plane SR
induced by the ordered spanning vectors |0i, |x
0i is the same orientation
as that induced by each of the ordered bases x
0 , |x0 i and |0 i, 0 .
(Please refer to Figure 2.)
Remark 19. The removal of the above ambiguities is really not essential.
However, it does simplify the exposition given below.
85
Let denote the angle in SR from L|x i to L|0 i , which by plane geometry
0
x to |0 i, which in turn is the same as the
is the same as the angle
from
0
angle from |x0 i to 0 . Then by the above theorem Q|SR = I| i I|x0 i is
0
a rotation about the origin by the angle 2.
The key idea in Grovers algorithm is to move |0i toward the unknown
state |x0 i by successively applying the rotation Q to |0i to rotate it around
to |x0 i. This process is called amplitude amplification.
Once this
process is completed, the measurement of the resulting state (with respect
to the standard basis) will, with high probability, yield the unknown state
|x0 i. This is the essence of Grovers algorithm.
27
The line L|x i is the intersection of the plane SR with the hyperplane in H orthogonal
0
86
E
|0 i = sin |x0i + cos x
,
0
E
|k i = Qk |0 i = sin [(2k + 1) ] |x0 i + cos [(2k + 1) ] x
.
0
,
K = k = round
4 2
We can determine the angle by noting that the angle from |0i and
|x0 i is complementary to , i.e.,
+ = /2 ,
and hence,
1
(for large N ) ,
= sin
N
N
and hence,
1
1
round
K = k = round
N
(for large N ).
2
4
2
4 sin1 1N
28
The reader may prefer to use the f loor function instead of the round function.
87
(Initialization)
|i H |0i =
k
STEP 1.
1
N
N
1
X
j=0
|ji
4 sin1 (1/ N )
|i Q |i = HI|0iHI|x0 i |i
k
STEP 2.
1
2
round
1
N
4
2
k + 1
Part 1. The probability of error P robE of finding the hidden state |x0 i is given
by
P robE = cos2 [(2K + 1) ] ,
where
29
1 1
=
sin
,
K = round 1
4
2
If the reader prefers to use the f loor function rather than the round function, then
probability of error becomes P robE N4 N42 .
88
1 K
(2K + 1)
= sin = cos
Thus,
2
cos [(2K + 1) ] cos
sin
+ = sin
1
N
N
Part 2. The computational cost of the Hadamard transform H = n1
H (2)
0
is O(n) = O(lg N ) single qubit operations. The transformations I|0i
and I|x0 i each carry a computational cost of O(1).
1 is the computationally dominant step. In STEP 1 there are
STEP
N iterations. In each iteration, the Hadamard transform is apO
plied twice. The transformations I|0i and I|x0 i are each applied once.
Hence, each iteration comes with
a computational cost of O (lg N ), and
so the total cost of STEP 1 is O( N lg N ).
1
0
I|x0 i = I|5i =
0
0
I|?i
Out
0 0 0
0 0 0 0
1 0 0
0 0 0 0
0 1 0
0 0 0 0
0 0 1
0 0 0 0
0 0 0
1 0 0 0
0 0 0
0 1 0 0
0 0 0
0 0 1 0
0 0 0
0 0 0 1
I|?i
89
So we do not know what I|x0 i and x0 are. The only way that we can glean
some information about x0 is to apply some chosen state |i as input, and
then make use of the resulting output.
HI|0iHI|?i
Q = HI|0i HI|x0 i
I|?i
1
=
4
3
1
1
1
1 3
1
1
1
1 3
1
1
1
1 3
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
3
1
1
1 3
1
1
1 3
1
1
1
1
1
1
1
1
3
HI|0i HI|?i
I|?i
1
8
(1, 1, 1, 1, 1, 1, 1, 1)transpose
4 sin1
1
2
1/ 8
=2
times in STEP 1.
Iteration 1. On the first iteration, we obtain the unknown state
|1 i = Q |0i =
4 2
(1, 1, 1, 1, 5, 1, 1, 1)transpose
is one
90
8 2
|5i
121
= 0.9453
128
7
= 0.0547
128
References
[1] Barenco, A, C.H. Bennett, R. Cleve, D.P. DiVincenzo, N. Margolus, P. Shor, T.
Sleator, J.A. Smolin, and H. Weinfurter, Elementary gates for quantum computation, Phys. Rev. A, 52, (1995), pp 3475 - 3467.
[2] Beardon, Alan F., The Geometry of Discrete Groups, Springer-Verlag, (1983).
[3] Bell, J.S., Physics, 1, (1964), pp 195 - 200.
[4] Bell, J.S., Speakable and Unspeakable in Quantum Mechanics, Cambridge
University Press (1987).
[5] Bennett, C.H. et al., Phys. Rev. Lett. 70, (1995), pp 1895.
[6] Bennett, C.H., D.P. DiVincenzo, J.A. Smolin, and W.K. Wootters, Ohys. Rev. A,
54, (1996), pp 3824.
[7] Berman, Gennady, Gary D. Doolen, Ronnie Mainieri, and Vladimir I. Tsifrinovich,
Introduction to Quantum Computation, World Scientific (1999).
[8] Bernstein, Ethan, and Umesh Vazirani, Quantum complexity theory, Siam J.
Comput., Vol. 26, No.5 (1997), pp 1411 - 1473.
[9] Brandt, Howard E., Qubit devices and the issue of quantum decoherence,
Progress in Quantum Electronics, Vol. 22, No. 5/6, (1998), pp 257 - 370.
91
[10] Brandt, Howard E., Qubit devices, Lecture Notes for the AMS Short Course
on Quantum Computation, Washington, DC, January 2000, to appear in
Quantum Computation, edited by S.J. Lomonaco, AMS PSAPM Series. (To
appear)
[11] Brassard, Gilles, and Paul Bratley, Algorithmics: Theory and Practice,
Printice-Hall, (1988).
[12] Brooks, Michael (Ed.), Quantum Computing and Communications, SpringerVerlag (1999).
[13] Bub, Jeffrey, Interpreting the Quantum World, Cambridge University Press
(1997).
[14] Cartan, Henri, and Samuel Eilenberg, Homological Algebra, Princeton University Press, Princeton, New Jersey, (1956)
[15] Cerf, Nicholas J. and Chris Adami, Quantum information theory of entanglement and measurement, in Proceedings of Physics and Computation,
PhysComp96, edited by J. Leao T. Toffoli, pp 65 - 71. See also quant-ph/9605039
.
[16] Cohen-Tannoudji, Claude, Bernard Diu, and Frank Laloe, Quantum Mechanics,
Volumes 1 & 2, John Wiley & Sons (1977)
[17] DEspagnat, Bernard, Veiled Reality: Analysis of Present Day Quantum
Mechanical Concepts, Addison-Wesley (1995)
[18] DEspagnat, Bernard, Conceptual Foundations of Quantum Mechanics,
(Second Edition), Addison-Wesley (1988)
[19] Cormen, Thomas H., Charles E. Leiserson, and Ronald L. Rivest, Introduction to
Algorithms, McGraw-Hill, (1990).
[20] Cox, David, John Little, and Donal OShea, Ideals, Varieties, and Algorithms,
(second edition), Springer-Verlag, (1996).
[21] Davies, E.B., Quantum Theory of Open Systems, Academic Press, (1976).
[22] Deutsch, David, The Fabric of Reality, Penguin Press, New York (1997).
[23] Deutsch, David, and Patrick Hayden, Information flow in entangled quantum
systems, quant-ph/9906007.
[24] Deutsch, David, Quantum theory, the Church-Turing principle and the universal quantum computer, Proc. Royal Soc. London A, 400, (1985), pp 97 - 117.
[25] Dirac, P.A.M., The Principles of Quantum Mechanics, (Fourth edition). Oxford University Press (1858).
[26] Einstein, A., B. Podolsky, N. Rosen, Can quantum, mechanical description of
physical reality be considered complete?, Phys. Rev. 47, 777 (1935); D. Bohm
Quantum Theory, Prentice-Hall, Englewood Cliffs, NJ (1951).
[27] Ekert, Artur K.and Richard Jozsa, Quantum computation and Shors factoring
algorithm, Rev. Mod. Phys., 68,(1996), pp 733-753.
[28] Feynman, Richard P., Robert B. Leighton, and Matthew Sands, The Feyman Lectures on Physics: Vol. III. Quantum Mechanics, Addison-Wesley Publishing
Company, Reading, Massachusetts (1965).
[29] Feynman, Richard P., Feynman Lectures on Computation, (Edited by Anthony J.G. Hey and Robin W. Allen), Addison-Wesley, (1996).
[30] Gilmore, Robert, Alice in Quantumland, Springer-Verlag (1995).
[31] Gottesman, Daniel, The Heisenberg representation of quantum computers,
quant-ph/9807006.
[32] Gottesman, Daniel, An introduction to quantum error correction, Lecture
Notes for the AMS Short Course on Quantum Computation, Washington,
DC, January 2000, to appear in Quantum Computation, edited by S.J.
Lomonaco, AMS PSAPM Series. (To appear) (quant-ph/0004072)
[33] Gottfreid, Quantum Mechanics: Volume I. Fundamentals, Addison-Wesley
(1989).
92
[34] Grover, Lov K., Quantum computer can search arbitrarily large databases
by a single querry, Phys. Rev. Letters (1997), pp 4709-4712.
[35] Grover, Lov K., A framework for fast quantum mechanical algorithms, quantph/9711043.
[36] Grover, L., Proc. 28th Annual ACM Symposium on the Theory of Computing, ACM
Press, New Yorkm (1996), pp 212 - 219.
[37] Grover, L., Phys. Rev. Lett. 78, (1997), pp 325 - 328.
[38] Gruska, Jozef, Quantum Computing, McGraw-Hill, (1999)
[39] Gunther, Ludwig, An Axiomatic Basis for Quantum Mechanics: Volume I. Derivation of Hilbert Space Structure, Springer-Verlag (1985).
[40] Haag, R., Local Quantum Physics: Fields, Particles, Algebras, (2nd revised
edition), Springer-Verlag.
[41] Heisenberg, Werner, The Physical Principles of Quantum Theory, translated
by Eckart and Hoy, Dover.
[42] Hardy, G.H., and E.M. Wright, An Introduction to the Theory of Numbers,
Oxford Press, (1965).
[43] Helstrom, Carl W., Quantum Detection and Estimation Theory, Academic
Press (1976).
[44] Hey, Anthony J.G. (editor), Feynman and Computation, Perseus Books, Reading, Massachusetts, (1998).
[45] Horodecki, O., M. Horodecki, and R. Horodecki, Phys. Rev. Lett. 82, (1999), pp
1056.
[46] Holevo, A.S., Probabilistic and Statistical Aspects of Quantum Theory,
North-Holland, (1982).
[47] Hoyer, Peter, Efficient quantum transforms, quant-ph/9702028.
[48] Jauch, Josef M., Foundations of Quantum Mechanics, Addison-Wesley Publishing Company, Reading, Massachusetts (1968).
[49] Jozsa, Richard, Searching in Grovers Algorithm, quant-ph/9901021.
[50] Jozsa, Richard, Quantum algorithms and the Fourier transform, quant-ph
preprint archive 9707033 17 Jul 1997.
[51] Jozsa, Richard, Proc. Roy. Soc. London Soc., Ser. A, 454, (1998), 323 - 337.
[52] Kauffman, Louis H., Quantum topology and quantum computing, Lecture
Notes for the AMS Short Course on Quantum Computation, Washington,
DC, January 2000, to appear in Quantum Computation, edited by S.J.
Lomonaco, AMS PSAPM Series. (To appear)
[53] Kitaev, A., Quantum measurement and the abelian stabiliser problem,
(1995), quant-ph preprint archive 9511026.
[54] Kitaev, Alexei, Quantum computation with anyons, Lecture Notes for the
AMS Short Course on Quantum Computation, Washington, DC, January
2000, to appear in Quantum Computation, edited by S.J. Lomonaco, AMS
PSAPM Series. (To appear)
[55] Lang, Serge, Algebra, Addison- Wesley (1971).
[56] Lenstra, A.K., and H.W. Lenstra, Jr., eds., The Development of the Number
Field Sieve, Lecture Notes in Mathematics, Vol. 1554, Springer-Velag, (1993).
[57] Lenstra, A.K., H.W. Lenstra, Jr., M.S. Manasse, and J.M. Pollard, The number
field sieve. Proc. 22nd Annual ACM Symposium on Theory of ComputingACM,
New York, (1990), pp 564 - 572. (See exanded version in Lenstra & Lenstra, (1993),
pp 11 - 42.)
[58] LeVeque, William Judson, Topics in Number Theory: Volume I, AddisonWesley, (1958).
[59] Linden, N., S. Popescu, and A. Sudbery, Non-local properties of multi-particle
density matrices, quant-ph/9801076.
93
[60] Lo, Hoi-Kwong, Tim Spiller & Sandu Popescu(editors), Introduction to Quantum Computation & Information, World Scientific (1998).
[61] Lomonaco, Samuel J., Jr., A tangled tale of quantum entanglement: Lecture
Notes for the AMS Short Course on Quantum Computation, Washington,
DC, January 2000, to appear in Quantum Computation, edited by S.J.
Lomonaco, AMS PSAPM Series. (To appear)
[62] Lomonaco, Samuel J., Jr., A quick glance at quantum cryptography, Cryptologia, Vol. 23, No. 1, January,1999, pp 1-41. (quant-ph/9811056)
[63] Lomonaco, Samuel J., Jr., A talk on quantum cryptography: How Alice
Outwits Eve, in Coding Theory and Cryptography: From Enigma and
Geheimsschreiber to Quantum Theory, edited by David Joyner, SpringerVerlag, (2000), pp 144 - 174.
[64] Mackey, George W., Mathematical Foundations of Quantum Mechanics,
Addison-Wesley (1963).
[65] Milburn, Gerald J., The Feynman Processor, Perseus Books, Reading, Massachusetts (1998)
[66] Miller, G.L., Riemanns hypothesis and tests for primality, J. Comput. System
Sci., 13, (1976), pp 300 - 317.
[67] Nielsen, M.A., Continuity bounds on entanglement, Phys. Rev. A, Vol. 61,
064301, pp 1-4.
[68] Omn`es, Roland, An Interpretation of Quantum Mechanics, Princeton University Press, Princeton, New Jersey, (1994).
[69] Omn`es, Roland, Understanding Quantum Mechanics, Princeton University
Press (1999).
[70] von Neumann, John, Mathematical Foundations of Quantum Mechanics,
Princeton University Press.
[71] Penrose, Roger, The Large, the Small and the Human Mind, Cambridge
University Press, (1997).
[72] Peres, Asher, Quantum Theory: Concepts and Methods, Kluwer Academic
Publishers, Boston, (1993).
[73] Raymond, Pierre, Field Theory: A Modern Primer, Addison-Wesley (1989).
[74] Piron, C., Foundations of Quantum Physics, Addison-Wesley, (1976).
[75] Sakurai, J.J., Modern Quantum Mechanics, (Revised edition), Addison-Wesley
Publishing Company, Reading, Massachusetts (1994).
[76] Schumacher, Benjamin, Sending entanglement through noisy quantum channels, (22 April 1996), quant-ph/9604023.
[77] Shor, Peter W., Polynomial time algorithms for prime factorization and
discrete logarithms on a quantum computer, SIAM J. on Computing, 26(5)
(1997), pp 1484 - 1509. (quant-ph/9508027)
[78] Shor, Peter W., Introduction to quantum algorithms, Lecture Notes for the
AMS Short Course on Quantum Computation, Washington, DC, January
2000, to appear in Quantum Computation, edited by S.J. Lomonaco, AMS
PSAPM Series. (To appear) (quant-ph/0005003)
[79] Stinson, Douglas R., Cryptography: Theory and Practice, CRC Press, Boca
Raton, (1995).
[80] Vazirani, Umesh, Quantum complexity theory, Lecture Notes for the AMS
Short Course on Quantum Computation, Washington, DC, January 2000,
to appear in Quantum Computation, edited by S.J. Lomonaco, AMS PSAPM
Series. (To appear)
[81] Williams, Collin P., and Scott H. Clearwater, Explorations in Quantum Computation, Springer-Verlag (1997).
[82] Williams, Colin, and Scott H. Clearwater, Ultimate Zero and One, Copernicus,
imprint by Springer-Verlag, (1998).
94
[83] Wootters, W.K., and W.H. Zurek, A single quantum cannot be cloned, Nature,
Vol. 299, 28 October 1982, pp 982 - 983.
Index
Entropy, Shannon, 42
Entropy, von Neumann, 43, 45
EPR, 33, 35, 38
Eulers constant, 72
Expected Value, 17
Adjoint, 12
Big, 27
Little, 27
Alice, 37, 39
Ancilla, 41
Automorphism Group, 49
Filtration, 15
Fourier Transform, 64
Bennett, 35, 48
Blackbox, 79, 87
Bob, 37, 39
Bra, 8
Bracket, 8
Hamiltonian, 19
Heisenberg
Uncertainty Principle, 18
Heisenberg, Picture, 28, 30
Hermitian Operator, 13
Hilbert Space, 7
Inversion, 80
Juxtaposition, 30
Ket, 8
Kronecker Sum, 39
lg, 42
Lie Group, 38
Local
Sufficiently, 41
Local Equivalence, 39
Local Interaction, 36
Local Lie Algebra, 39
Local Subgroup, 38
Local Unitary Transformation, 38
96
Compatible Operators, 18
OpenQuacks Public Domain Software, 87
Operator
Compatible, 18
Hermitian, 13
Incompatible, 18
Measurement, 13
Self-Adjoint, 13
Unitary, 19
Orbits, 39
Partial Trace, 24, 26
Partition, 41
Path-Ordered Integral, 20
Pauli Spin Matrices, 14
Permutation Group, 48
Plancks Constant, 19
Podolsky, 35
Polarized Light, 5, 6
Positive Operator Valued Measure, 16
POVM, 16
Primality Testing, 61
Principle of Non-Locality, 36, 37
Probabilistic Operator Valued Measure,
16
Probability Distribution, 42
Projection Operator, 45
Quantum
Repeater, 56
Replicator, 55
Quantum Entangled, 30, 34, 42
Quantum Register, 31, 32
Qubit, 6, 7
Radix 2 Representation, 63
Reality
Principle of, 36
Repeater
Quantum, 56
Replicator
Quantum, 55
Reversible Computation, 48
Rosen, 35
Rotation, 53
round function, 84
Schrodinger Picture, 28
Selective Measurement Operator, 15
Self-Adjoint Operator, 13
Shor, 59
Shors Algorithm, 60, 78
Spacelike Distance, 37
Square Root of
NOT, 53
SWAP, 53
Standard Deviation, 18
Standard Unitary Representation, 50
Stochastic Source, 42
Sufficiently Local Unitary Transformation, see also Unitary
Superluminal Communication, 37
Superposition, 6, 31, 32
SWAP Gate, 52
Symbols
Output, 42, 45
Symmetric Group, 50
Teleportation, 56
Teleportation, Quantum, 56, 59
Tensor Product, 9
Toffoli Gate, 49, 51
Trace, 24
Unitary
Operator, 19
Sufficiently Local, 41
Transformation, 19
(), asymptotic lower bound, 73
Wiring Diagram, 4954
Wiring Diagrams
Implicit Frame, 53
Wootters, 35, 54
Zurek, 54
97